Skip to content

Commit 249ffdf

Browse files
committed
Disallow dangerous qrexec operations
Whonix-Workstation should never need to open a file, URL, or application in anything other than a Whonix-Workstation disposable VM. Allowing it to even ask to do one of these actions in an unsafe way is dangerous, since a user who isn't paying enough attention might allow the request and leak their IP address in so doing (for instance, by visiting an attacker-provided URL in a VM that has clearnet access). Don't allow Whonix-Workstation to take (or ask to take) any of these dangerous actions.
1 parent d1fb89a commit 249ffdf

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

qubes-rpc-policy/80-whonix.policy

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,3 +11,18 @@ whonix.GatewayCommand +restart @tag:anon-gateway @tag:anon-vm allow autost
1111
whonix.GatewayCommand +stop @tag:anon-gateway @tag:anon-vm allow autostart=no
1212
whonix.GatewayCommand +showlog @tag:anon-gateway @tag:anon-vm allow autostart=no
1313
whonix.GatewayCommand * @anyvm @anyvm deny
14+
15+
# Harden against potential IP leaks by not allowing a compromised
16+
# Whonix-Workstation to open files, URLs, or applications in VMs other than
17+
# Whonix-Workstation VMs (typically DispVMs).
18+
qubes.OpenInVM * @tag:anon-vm @dispvm ask default_target=@dispvm
19+
qubes.OpenInVM * @tag:anon-vm @tag:anon-vm ask
20+
qubes.OpenInVM * @tag:anon-vm @anyvm deny
21+
22+
qubes.OpenURL * @tag:anon-vm @dispvm ask default_target=@dispvm
23+
qubes.OpenURL * @tag:anon-vm @tag:anon-vm ask
24+
qubes.OpenURL * @tag:anon-vm @anyvm deny
25+
26+
qubes.StartApp * @tag:anon-vm @dispvm ask default_target=@dispvm
27+
qubes.StartApp * @tag:anon-vm @tag:anon-vm ask
28+
qubes.StartApp * @tag:anon-vm @anyvm deny

0 commit comments

Comments
 (0)